Line 30: |
Line 30: |
| == External Links: == | | == External Links: == |
| | | |
− | * https://essay.utwente.nl/75407/1/Kruthoff_BA_BMS.pdf | + | * https://essay.utwente.nl/75407/1/Kruthoff_BA_BMS.pdf One of the use cases of Privacy Calculus Theory |
− | * https://www.efmaefm.org/0EFMAMEETINGS/EFMA%20ANNUAL%20MEETINGS/2017-Athens/papers/EFMA2017_0512_fullpaper.pdf | + | * https://www.efmaefm.org/0EFMAMEETINGS/EFMA%20ANNUAL%20MEETINGS/2017-Athens/papers/EFMA2017_0512_fullpaper.pdf One of the perspectives of Privacy Calculus Theory |
− | * https://adlnet.gov/assets/uploads/2017%20---%20(SSRN%20Journal)%20Knijnenburg%20et%20al.%20-%20Death%20To%20The%20Privacy%20Calculus.pdf | + | * https://adlnet.gov/assets/uploads/2017%20---%20(SSRN%20Journal)%20Knijnenburg%20et%20al.%20-%20Death%20To%20The%20Privacy%20Calculus.pdf Challenge to the rationale of Privacy Calculus Theory |
| + | * |
| * | | * |